Exam 9: Firewalls

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

What should a company concerned about protecting its data warehouses and employee privacy might consider installing on the network perimeter to prevent direct connections between the internal network and the Internet?

Free
(Multiple Choice)
4.8/5
(41)
Correct Answer:
Verified

D

MATCHING -hardware or software configured to block unauthorized access to a network

Free
(Multiple Choice)
4.9/5
(35)
Correct Answer:
Verified

B

ACLs filter packets by using a __________ base to determine whether to allow a packet to pass.

Free
(Short Answer)
4.7/5
(31)
Correct Answer:
Verified

rule

A primary objective of a rule base is to ______________ communications based on complex rules.

(Short Answer)
4.8/5
(40)

Which two ports should packet-filtering rules address when establishing rules for Web access?

(Multiple Choice)
4.9/5
(32)

What service uses UDP port 53?

(Multiple Choice)
4.9/5
(37)

What is considered the 'cleanup rule' on a Cisco router?

(Multiple Choice)
4.9/5
(38)

MATCHING -software that forwards network packets and caches Web pages to speed up network performance

(Multiple Choice)
4.8/5
(42)

Which of the following is a general practice for a rule base?

(Multiple Choice)
4.8/5
(31)

What is a cleanup rule? Provide an example.

(Essay)
4.9/5
(35)

Which of the following is an advantage of hardware firewalls?

(Multiple Choice)
4.9/5
(41)

Generally,connections to instant-messaging ports are harmless and should be allowed.

(True/False)
4.8/5
(28)

Firewalls can protect against employees copying confidential data from within the network.

(True/False)
4.8/5
(38)

Which of the following is a typical drawback of a free firewall program?

(Multiple Choice)
4.8/5
(36)

Describe a firewall policy for application traffic.

(Essay)
4.9/5
(37)

MATCHING -a packet-filtering rule that comes last in a rule base and covers any packets that have not been covered by preceding rules

(Multiple Choice)
4.7/5
(30)

What makes an effective rule base? List three points to consider.

(Essay)
4.9/5
(34)

Software firewalls are usually more scalable than hardware firewalls.

(True/False)
4.9/5
(30)

Which of the following is a method for supporting IPv6 on IPv4 networks until IPv6 is universally adopted?

(Multiple Choice)
4.8/5
(33)

A firewall can consist of all devices positioned on the network _____________.

(Short Answer)
4.9/5
(35)
Showing 1 - 20 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)